Building Security: Strategies and CostsISBN: 978-0-87629-698-1
Hardcover
416 pages
April 2003
This is a Print-on-Demand title. It will be printed specifically to fill your order. Please allow an additional 10-15 days delivery time. The book is not returnable.
|
About the Author and Contributors.
Introduction.
Part One: Risk Assessment and Security Planning.
Chapter One: People and Property.
People.
Property.
Communications Security.
Conflicts Between Security and Safety.
Conclusion.
Chapter Two: Identifying Security Threats.
What Can Happen.
Threats to Personnel Safety.
Theft of Property.
Vandalism and Sabotage.
Conclusion.
Chapter Three: Assessing the Risks.
Assigning the Assessment and Response Team.
Periodic Review of Documentation.
Assembling a Risk Assessment Group.
Deciding Where to Focus Security Measures.
Assessing the Facility.
Assessment of Specific Risks.
Probability of Occurrence.
Assessing Facilities by Type.
Conclusion.
Chapter Four: Crisis Management.
Making Crisis Management Plans.
Who Prepares the Plan?
What Are the Critical Objectives?
Teams and Teaming.
Chapter Five: Security through Planning, Design, and Operations.
The Urban Setting.
Three Approaches to Physical Protection.
Public Space Versus Private Space.
Creating and Updating a Security-Conscious Building Plan.
Single-User Versus Multi-User Facilities.
A Word of Caution.
Storage of Volatile Materials.
Protecting Utilities.
Ingress Concerns.
Establishing a New Physical Security Plan.
Budgeting and Startup.
The Security Station.
Points of Egress and Refuge.
Fire Suppression and Alarm.
Interior Planning and Design.
Other Interior Spaces.
Conclusion.
Chapter Six: Chemical, Biological, and Radiological Agents.
Biological Agents.
Chemical Agents.
Radiation.
Conclusion.
Chapter Seven: Responses to Emergency Events.
Emergency Response Teams and Plans.
Evacuation.
Alert Systems.
Shelter from Severe Weather.
Weather Forecasting Sources.
Emergency Equipment.
Health, Safety, and Security.
Fresh Air and Lighting.
Conclusion.
Chapter Eight: Security Devices and Systems.
Controlling Access.
Review of Security Devices and Systems.
Emergency Communications.
A Word About Privacy and Security.
Conclusion.
Chapter Nine: Integration of Security and Related Systems.
Information Technology Security.
Monitoring.
Proprietary or On-Site Systems.
Off-Site Monitored Systems.
Components of Security Monitoring Stations.
Integration and Enterprise Security and Safety.
What Components Should Be Integrated?
Integrated Components.
Deciding Which Systems to Integrate, and When.
Conclusion.
Part Two: Security Cost Data.
Introduction to the Cost Data.
Quick Start.
How to Use the Cost Data: The Details.
How to Use the Unit Price Pages.
Unit Price Section.
How to Use the Assemblies Cost Tables.
Assemblies Section.
Crews.
Location Factors.
Part Three: Appendix, Resources, Glossary, and Index.
Introduction.
Appendix.
Resources.
Glossary.
Index.